/openbmc/qemu/authz/ |
H A D | list.c | 33 QAuthZListRuleList *rules = lauthz->rules; in qauthz_list_is_allowed() local 35 while (rules) { in qauthz_list_is_allowed() 36 QAuthZListRule *rule = rules->value; in qauthz_list_is_allowed() 57 rules = rules->next; in qauthz_list_is_allowed() 92 visit_type_QAuthZListRuleList(v, name, &lauthz->rules, errp); in qauthz_list_prop_get_rules() 102 oldrules = lauthz->rules; in qauthz_list_prop_set_rules() 103 visit_type_QAuthZListRuleList(v, name, &lauthz->rules, errp); in qauthz_list_prop_set_rules() 114 qapi_free_QAuthZListRuleList(lauthz->rules); in qauthz_list_finalize() 157 QAuthZListRuleList *rules, *tmp; in qauthz_list_append_rule() local 169 rules = auth->rules; in qauthz_list_append_rule() [all …]
|
/openbmc/phosphor-fan-presence/monitor/test/ |
H A D | power_off_rule_test.cpp | 63 auto rules = getPowerOffRules(faultConfig, powerIface, func); in TEST() local 64 ASSERT_EQ(rules.size(), 4); in TEST() 73 rules[0]->check(PowerRuleState::runtime, health); in TEST() 74 EXPECT_FALSE(rules[0]->active()); in TEST() 76 rules[0]->check(PowerRuleState::atPgood, health); in TEST() 77 EXPECT_TRUE(rules[0]->active()); in TEST() 85 rules[0]->cancel(); in TEST() 86 EXPECT_FALSE(rules[0]->active()); in TEST() 91 rules[1]->check(PowerRuleState::runtime, health); in TEST() 92 EXPECT_FALSE(rules[1]->active()); in TEST() [all …]
|
/openbmc/openbmc/meta-raspberrypi/recipes-core/udev/ |
H A D | udev-rules-rpi.bb | 1 DESCRIPTION = "udev rules for Raspberry Pi Boards" 7 file://can.rules \ 8 file://fb.rules \ 17 install -d ${D}${sysconfdir}/udev/rules.d 18 install -m 0644 ${S}/etc.armhf/udev/rules.d/99-com.rules ${D}${sysconfdir}/udev/rules.d/ 19 install -m 0644 ${UNPACKDIR}/can.rules ${D}${sysconfdir}/udev/rules.d/ 20 install -m 0644 ${UNPACKDIR}/fb.rules ${D}${sysconfdir}/udev/rules.d/
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/multipath-tools/files/ |
H A D | 0001-RH-fixup-udev-rules-for-redhat.patch | 4 Subject: [PATCH] RH: fixup udev rules for redhat 6 The multipath rules need to run after scsi_id is run. This means moving 7 them after 60-persistent-storage.rules for redhat. Redhat also uses a 26 kpartx/kpartx.rules.in | 2 +- 37 udevrulesdir := $(libudevdir)/rules.d 43 diff --git a/kpartx/kpartx.rules.in b/kpartx/kpartx.rules.in 45 --- a/kpartx/kpartx.rules.in 46 +++ b/kpartx/kpartx.rules.in 61 $(Q)$(INSTALL_PROGRAM) -m 644 11-dm-mpath.rules $(DESTDIR)$(udevrulesdir) 62 $(Q)$(INSTALL_PROGRAM) -m 644 99-z-dm-mpath-late.rules $(DESTDIR)$(udevrulesdir) [all …]
|
/openbmc/openbmc/poky/meta/recipes-core/udev/ |
H A D | udev-extraconf_1.1.bb | 8 file://automount.rules \ 11 file://autonet.rules \ 13 file://localextra.rules \ 23 install -d ${D}${sysconfdir}/udev/rules.d 25 install -m 0644 ${S}/automount.rules ${D}${sysconfdir}/udev/rules.d/automount.rules 26 install -m 0644 ${S}/autonet.rules ${D}${sysconfdir}/udev/rules.d/autonet.rules 27 install -m 0644 ${S}/localextra.rules ${D}${sysconfdir}/udev/rules.d/localextra.rules 59 # to replace udev-extra-rules from meta-oe 60 RPROVIDES:${PN} = "udev-extra-rules" 61 RREPLACES:${PN} = "udev-extra-rules" [all …]
|
/openbmc/linux/security/apparmor/ |
H A D | resource.c | 92 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_setrlimit() local 93 typeof(*rules), list); in profile_setrlimit() 96 if (rules->rlimits.mask & (1 << resource) && new_rlim->rlim_max > in profile_setrlimit() 97 rules->rlimits.limits[resource].rlim_max) in profile_setrlimit() 168 struct aa_ruleset *rules = list_first_entry(&old->rules, in __aa_transition_rlimits() local 169 typeof(*rules), in __aa_transition_rlimits() 171 if (rules->rlimits.mask) { in __aa_transition_rlimits() 176 if (rules->rlimits.mask & mask) { in __aa_transition_rlimits() 188 struct aa_ruleset *rules = list_first_entry(&new->rules, in __aa_transition_rlimits() local 189 typeof(*rules), in __aa_transition_rlimits() [all …]
|
H A D | policy_unpack.c | 565 static bool unpack_secmark(struct aa_ext *e, struct aa_ruleset *rules) in unpack_secmark() argument 575 rules->secmark = kcalloc(size, sizeof(struct aa_secmark), in unpack_secmark() 577 if (!rules->secmark) in unpack_secmark() 580 rules->secmark_count = size; in unpack_secmark() 583 if (!unpack_u8(e, &rules->secmark[i].audit, NULL)) in unpack_secmark() 585 if (!unpack_u8(e, &rules->secmark[i].deny, NULL)) in unpack_secmark() 587 if (!aa_unpack_strdup(e, &rules->secmark[i].label, NULL)) in unpack_secmark() 599 if (rules->secmark) { in unpack_secmark() 601 kfree(rules->secmark[i].label); in unpack_secmark() 602 kfree(rules->secmark); in unpack_secmark() [all …]
|
H A D | net.c | 113 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_profile_af_perm() local 114 typeof(*rules), list); in aa_profile_af_perm() 124 state = RULE_MEDIATES(rules, AA_CLASS_NET); in aa_profile_af_perm() 130 state = aa_dfa_match_len(rules->policy.dfa, state, (char *) &buffer, in aa_profile_af_perm() 132 perms = *aa_lookup_perms(&rules->policy, state); in aa_profile_af_perm() 226 struct aa_ruleset *rules = list_first_entry(&profile->rules, in aa_secmark_perm() local 227 typeof(*rules), list); in aa_secmark_perm() 229 if (rules->secmark_count == 0) in aa_secmark_perm() 232 for (i = 0; i < rules->secmark_count; i++) { in aa_secmark_perm() 233 if (!rules->secmark[i].secid) { in aa_secmark_perm() [all …]
|
H A D | capability.c | 67 struct aa_ruleset *rules = list_first_entry(&profile->rules, in audit_caps() local 68 typeof(*rules), list); in audit_caps() 77 !cap_raised(rules->caps.audit, cap))) in audit_caps() 81 cap_raised(rules->caps.kill, cap)) { in audit_caps() 83 } else if (cap_raised(rules->caps.quiet, cap) && in audit_caps() 121 struct aa_ruleset *rules = list_first_entry(&profile->rules, in profile_capable() local 122 typeof(*rules), list); in profile_capable() 125 if (cap_raised(rules->caps.allow, cap) && in profile_capable() 126 !cap_raised(rules->caps.denied, cap)) in profile_capable()
|
/openbmc/openbmc/meta-google/recipes-google/nftables/files/ |
H A D | nft-configure.sh | 6 for file in "$dir"/*.rules; do 12 rules="" 14 rules="$(mktemp)" || exit 15 echo 'flush ruleset' >"$rules" 18 echo '' >>"$rules" 19 cat "${basemap[$key]}" >>"$rules" 21 nft -f "$rules" || exit
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/linuxconsole/ |
H A D | linuxconsole_1.7.1.bb | 16 file://51-these-are-not-joysticks-rm.rules \ 17 file://60-joystick.rules \ 53 …KDIR}/51-these-are-not-joysticks-rm.rules ${D}${nonarch_base_libdir}/udev/rules.d/51-these-are-not… 54 …install -Dm 0644 ${UNPACKDIR}/60-joystick.rules ${D}${nonarch_base_libdir}/udev/rules.d/60-joystic… 79 ${nonarch_base_libdir}/udev/rules.d/51-these-are-not-joysticks-rm.rules \ 81 ${nonarch_base_libdir}/udev/rules.d/60-joystick.rules \ 82 ${nonarch_base_libdir}/udev/rules.d/80-stelladaptor-joystick.rules \
|
/openbmc/openbmc/meta-facebook/meta-minerva/recipes-phosphor/console/ |
H A D | obmc-console_%.bbappend | 8 file://80-minerva-obmc-console-uart.rules \ 15 # Replace upstream-provided udev rules 16 install -d ${D}/${nonarch_base_libdir}/udev/rules.d 17 rm -f ${D}/${nonarch_base_libdir}/udev/rules.d/80-obmc-console-uart.rules 18 …all -m 0644 ${UNPACKDIR}/80-minerva-obmc-console-uart.rules ${D}/${nonarch_base_libdir}/udev/rules…
|
/openbmc/linux/drivers/net/dsa/qca/ |
H A D | qca8k-leds.c | 65 qca8k_parse_netdev(unsigned long rules, u32 *offload_trigger) in qca8k_parse_netdev() argument 68 if (test_bit(TRIGGER_NETDEV_TX, &rules)) in qca8k_parse_netdev() 70 if (test_bit(TRIGGER_NETDEV_RX, &rules)) in qca8k_parse_netdev() 72 if (test_bit(TRIGGER_NETDEV_LINK_10, &rules)) in qca8k_parse_netdev() 74 if (test_bit(TRIGGER_NETDEV_LINK_100, &rules)) in qca8k_parse_netdev() 76 if (test_bit(TRIGGER_NETDEV_LINK_1000, &rules)) in qca8k_parse_netdev() 78 if (test_bit(TRIGGER_NETDEV_HALF_DUPLEX, &rules)) in qca8k_parse_netdev() 80 if (test_bit(TRIGGER_NETDEV_FULL_DUPLEX, &rules)) in qca8k_parse_netdev() 83 if (rules && !*offload_trigger) in qca8k_parse_netdev() 278 qca8k_cled_hw_control_is_supported(struct led_classdev *ldev, unsigned long rules) in qca8k_cled_hw_control_is_supported() argument [all …]
|
/openbmc/openbmc/meta-google/recipes-core/dropbear/ |
H A D | dropbear_%.bbappend | 11 rules=$nftables_dir/50-dropbear-dev.rules 13 echo 'table inet filter {' >"$rules" 14 echo ' chain gbmc_br_pub_input {' >>"$rules" 15 echo ' tcp dport 22 accept' >>"$rules" 16 echo ' }' >>"$rules" 17 echo '}' >>"$rules"
|
/openbmc/openbmc/meta-facebook/meta-catalina/recipes-phosphor/network/ |
H A D | phosphor-network_%.bbappend | 5 file://90-hmc-usb0-network.rules \ 10 ${sysconfdir}/udev/rules.d/90-hmc-usb0-network.rules \ 17 install -d ${D}${sysconfdir}/udev/rules.d 18 …all -m 0644 ${UNPACKDIR}/90-hmc-usb0-network.rules ${D}${sysconfdir}/udev/rules.d/90-hmc-usb0-netw…
|
/openbmc/openbmc/meta-google/recipes-google/networking/ |
H A D | gbmc-iperf3.bb | 23 rules=$nftables_dir/50-gbmc-iperf3-dev.rules 25 echo 'table inet filter {' >"$rules" 26 echo ' chain gbmc_br_pub_input {' >>"$rules" 27 echo ' tcp dport 5201 accept' >>"$rules" 28 echo ' }' >>"$rules" 29 echo '}' >>"$rules"
|
/openbmc/openbmc/meta-quanta/meta-olympus-nuvoton/recipes-phosphor/ipmi/ |
H A D | phosphor-ipmi-kcs_%.bbappend | 3 SRC_URI:append:olympus-nuvoton = " file://99-ipmi-kcs.rules.rules" 8 install -d ${D}/${nonarch_base_libdir}/udev/rules.d 9 … install -m 0644 ${UNPACKDIR}/99-ipmi-kcs.rules.rules ${D}/${nonarch_base_libdir}/udev/rules.d
|
/openbmc/openbmc/meta-aspeed/recipes-core/udev/ |
H A D | udev-aspeed-vuart.bb | 1 SUMMARY = "udev rules for Aspeed VUART" 2 DESCRIPTION = "udev rules for Aspeed VUART" 9 SRC_URI += "file://61-aspeed-vuart.rules" 14 install -d ${D}/${nonarch_base_libdir}/udev/rules.d 15 install -m 0644 ${UNPACKDIR}/61-aspeed-vuart.rules ${D}/${nonarch_base_libdir}/udev/rules.d
|
H A D | udev-aspeed-mtd-partitions.bb | 1 SUMMARY = "udev rules for MTD partitions" 2 DESCRIPTION = "udev rules for MTD partitions" 9 SRC_URI += "file://76-aspeed-mtd-partitions.rules" 14 install -d ${D}/${nonarch_base_libdir}/udev/rules.d 15 …install -m 0644 ${UNPACKDIR}/76-aspeed-mtd-partitions.rules ${D}/${nonarch_base_libdir}/udev/rules…
|
/openbmc/openbmc/meta-nuvoton/meta-evb-npcm845/recipes-phosphor/network/ |
H A D | persistent-net-name.bb | 1 SUMMARY = "udev rules for persistent net name" 2 DESCRIPTION = "udev rules for persistent net name" 9 SRC_URI += "file://85-persistent-net.rules" 14 install -d ${D}/${base_libdir}/udev/rules.d 15 install -m 0644 ${UNPACKDIR}/85-persistent-net.rules ${D}/${base_libdir}/udev/rules.d
|
/openbmc/openbmc/meta-nuvoton/recipes-core/udev/ |
H A D | udev-nuvoton-mtd-partitions.bb | 1 SUMMARY = "udev rules for MTD partitions" 2 DESCRIPTION = "udev rules for MTD partitions" 9 SRC_URI = "file://76-nuvoton-mtd-partitions.rules" 14 install -d ${D}/${base_libdir}/udev/rules.d 15 install -m 0644 ${UNPACKDIR}/76-nuvoton-mtd-partitions.rules ${D}/${base_libdir}/udev/rules.d
|
/openbmc/openbmc/meta-hpe/meta-gxp/recipes-core/udev/ |
H A D | udev-gxp-mtd-partitions.bb | 1 SUMMARY = "udev rules for MTD partitions" 2 DESCRIPTION = "udev rules for MTD partitions" 9 SRC_URI += "file://76-gxp-mtd-partitions.rules" 14 install -d ${D}/${nonarch_base_libdir}/udev/rules.d 15 … install -m 0644 ${UNPACKDIR}/76-gxp-mtd-partitions.rules ${D}/${nonarch_base_libdir}/udev/rules.d
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/triggerhappy/ |
H A D | triggerhappy_git.bb | 27 ${nonarch_base_libdir}/udev/rules.d/80-triggerhappy.rules \ 31 CONFFILES:${PN} = "${sysconfdir}/udev/rules.d/80-triggerhappy.rules" 36 install -d ${D}${nonarch_base_libdir}/udev/rules.d 37 …nstall -m 0644 ${S}/udev/triggerhappy-udev.rules ${D}${nonarch_base_libdir}/udev/rules.d/80-trigge…
|
/openbmc/intel-ipmi-oem/src/ |
H A D | allowlist-filter.cpp | 330 namespace rules = sdbusplus::bus::match::rules; in postInit() 332 rules::type::signal() + rules::member("PropertiesChanged") + in postInit() 333 rules::interface("org.freedesktop.DBus.Properties") + in postInit() 334 rules::argN(0, restrictionModeIntf); in postInit() 337 rules::interfacesAdded() + in postInit() 338 rules::argNpath( in postInit() 342 rules::type::signal() + rules::member("PropertiesChanged") + in postInit() 343 rules::interface("org.freedesktop.DBus.Properties") + in postInit() 344 rules::argN(0, systemOsStatusIntf); in postInit() 347 rules::interfacesAdded() + in postInit() [all …]
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/audit/ |
H A D | audit_4.0.3.bb | 25 SYSTEMD_SERVICE:auditd = "auditd.service audit-rules.service" 61 ${datadir}/audit-rules/* ${libexecdir}/* \ 73 CONFFILES:auditd = "${sysconfdir}/audit/audit.rules" 83 # Install default rules 85 install -d -m 750 ${D}/etc/audit/rules.d 87 install -m 0640 ${S}/rules/10-base-config.rules ${D}/etc/audit/rules.d/audit.rules 89 # Based on the audit.spec "Copy default rules into place on new installation" 90 install -m 0640 ${D}/etc/audit/rules.d/audit.rules ${D}/etc/audit/audit.rules
|